Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-01-2025 03:51

General

  • Target

    b88d1e7aef75faddec233917cd11ed20d7eff4f7a27bca223ca22d6ae20cce1d.elf

  • Size

    31KB

  • MD5

    ad7c38b4dd11cf522136e5af13a6a261

  • SHA1

    d24caef533de469e419bec60cb73a63fe552f6f3

  • SHA256

    b88d1e7aef75faddec233917cd11ed20d7eff4f7a27bca223ca22d6ae20cce1d

  • SHA512

    27ecad11146f05c95f71b670ca36582bc6731c7d85f338c10b5570b58cfdeeacd379386cf635bc7ca20f1e0f29af5fa29d069a1d19d87476217ac652c9976cf8

  • SSDEEP

    384:6RxTYWk9NdUXOn7Gs/7PedWJe1swtHIRD0+dmbSyBDtwj7J4FEWscsmdGU5E/X:6i9H4OnMtswuXyBDtmnWa3UcX

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/b88d1e7aef75faddec233917cd11ed20d7eff4f7a27bca223ca22d6ae20cce1d.elf
    /tmp/b88d1e7aef75faddec233917cd11ed20d7eff4f7a27bca223ca22d6ae20cce1d.elf
    1⤵
    • Reads runtime system information
    PID:645

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads